Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 20:26

General

  • Target

    vnc-E4_2_8-x86_linux/java/vncviewer.jar

  • Size

    133KB

  • MD5

    df8b653d6109fd0980dcd5c8b22aef79

  • SHA1

    7abfa25c6ddd7bd0cf6dcc5d1ae27b5db286f5a3

  • SHA256

    fc21ef07868f1a13f4cf464bcb9edd2e1345bd7a8ab0ca3a85017dfac32edc50

  • SHA512

    fb0a11b885d7b6340528443bcafcdb58cee1dd842d37bfe830595b8d92f73cb0377328787e0a0c7377a4081a492d8a28fe48ab5ef2de7fb550dbad021abc2a05

  • SSDEEP

    3072:Jvujr+87n5hMWT9ckbJzS4LoiRGi2+Ub/HrV/mve5o0o+Es1/W1PBQKm:lpM5iGckbdEibWhmve5DoZI/uPBQ5

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\vnc-E4_2_8-x86_linux\java\vncviewer.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2780

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2780-2-0x00000245EB0C0000-0x00000245EB330000-memory.dmp

    Filesize

    2.4MB

  • memory/2780-16-0x00000245EB0A0000-0x00000245EB0A1000-memory.dmp

    Filesize

    4KB

  • memory/2780-18-0x00000245EB0A0000-0x00000245EB0A1000-memory.dmp

    Filesize

    4KB

  • memory/2780-20-0x00000245EB0A0000-0x00000245EB0A1000-memory.dmp

    Filesize

    4KB

  • memory/2780-22-0x00000245EB0C0000-0x00000245EB330000-memory.dmp

    Filesize

    2.4MB

  • memory/2780-25-0x00000245EB330000-0x00000245EB340000-memory.dmp

    Filesize

    64KB

  • memory/2780-26-0x00000245EB330000-0x00000245EB340000-memory.dmp

    Filesize

    64KB